Date:         Wed, 27 Jun 2007 15:08:13 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for httpd on SL5.x, SL4.x i386/x86_64
Comments: To: scientific-linux-errata@fnal.gov

Synopsis:	Moderate: httpd security update
Issue date:	 2007-06-26
CVE Names:	 CVE-2006-5752 CVE-2007-1863 CVE-2007-3304

The Apache HTTP Server did not verify that a process was an Apache child
process before sending it signals. A local attacker with the ability to run
scripts on the Apache HTTP Server could manipulate the scoreboard and cause
arbitrary processes to be terminated which could lead to a denial of
service (CVE-2007-3304).  This issue is not exploitable on
Scientific Linux 5 if using the default SELinux targeted policy.

A flaw was found in the Apache HTTP Server mod_status module. On sites
where the server-status page is publicly accessible and ExtendedStatus is
enabled this could lead to a cross-site scripting attack. On Scientific
Linux the server-status page is not enabled by default and it is
best practice to not make this publicly available. (CVE-2006-5752)

A bug was found in the Apache HTTP Server mod_cache module. On sites where
caching is enabled, a remote attacker could send a carefully crafted
request that would cause the Apache child process handling that request to
crash. This could lead to a denial of service if using a threaded
Multi-Processing Module. (CVE-2007-1863)

SL 4.x

   SRPMS:
	httpd-2.0.52-32.2.sl4.src.rpm
   i386:
	httpd-2.0.52-32.2.sl4.i386.rpm
	httpd-devel-2.0.52-32.2.sl4.i386.rpm
	httpd-manual-2.0.52-32.2.sl4.i386.rpm
	httpd-suexec-2.0.52-32.2.sl4.i386.rpm
	mod_ssl-2.0.52-32.2.sl4.i386.rpm
   x86_64:
	httpd-2.0.52-32.2.sl4.x86_64.rpm
	httpd-devel-2.0.52-32.2.sl4.x86_64.rpm
	httpd-manual-2.0.52-32.2.sl4.x86_64.rpm
	httpd-suexec-2.0.52-32.2.sl4.x86_64.rpm
	mod_ssl-2.0.52-32.2.sl4.x86_64.rpm

SL 5.x

   SRPMS:
	httpd-2.2.3-7.sl5.src.rpm
   i386:
	httpd-2.2.3-7.sl5.i386.rpm
	httpd-devel-2.2.3-7.sl5.i386.rpm
	httpd-manual-2.2.3-7.sl5.i386.rpm
	mod_ssl-2.2.3-7.sl5.i386.rpm
   x86_64:
	httpd-2.2.3-7.sl5.x86_64.rpm
	httpd-devel-2.2.3-7.sl5.i386.rpm
	httpd-devel-2.2.3-7.sl5.x86_64.rpm
	httpd-manual-2.2.3-7.sl5.x86_64.rpm
	mod_ssl-2.2.3-7.sl5.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2006-5752 httpd SL5.x, SL4.x i386/x86_64

Moderate: httpd security update

Summary

Date:         Wed, 27 Jun 2007 15:08:13 -0500Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for httpd on SL5.x, SL4.x i386/x86_64Comments: To: scientific-linux-errata@fnal.govSynopsis:	Moderate: httpd security updateIssue date:	 2007-06-26CVE Names:	 CVE-2006-5752 CVE-2007-1863 CVE-2007-3304The Apache HTTP Server did not verify that a process was an Apache childprocess before sending it signals. A local attacker with the ability to runscripts on the Apache HTTP Server could manipulate the scoreboard and causearbitrary processes to be terminated which could lead to a denial ofservice (CVE-2007-3304).  This issue is not exploitable onScientific Linux 5 if using the default SELinux targeted policy.A flaw was found in the Apache HTTP Server mod_status module. On siteswhere the server-status page is publicly accessible and ExtendedStatus isenabled this could lead to a cross-site scripting attack. On ScientificLinux the server-status page is not enabled by default and it isbest practice to not make this publicly available. (CVE-2006-5752)A bug was found in the Apache HTTP Server mod_cache module. On sites wherecaching is enabled, a remote attacker could send a carefully craftedrequest that would cause the Apache child process handling that request tocrash. This could lead to a denial of service if using a threadedMulti-Processing Module. (CVE-2007-1863)SL 4.x   SRPMS:	httpd-2.0.52-32.2.sl4.src.rpm   i386:	httpd-2.0.52-32.2.sl4.i386.rpm	httpd-devel-2.0.52-32.2.sl4.i386.rpm	httpd-manual-2.0.52-32.2.sl4.i386.rpm	httpd-suexec-2.0.52-32.2.sl4.i386.rpm	mod_ssl-2.0.52-32.2.sl4.i386.rpm   x86_64:	httpd-2.0.52-32.2.sl4.x86_64.rpm	httpd-devel-2.0.52-32.2.sl4.x86_64.rpm	httpd-manual-2.0.52-32.2.sl4.x86_64.rpm	httpd-suexec-2.0.52-32.2.sl4.x86_64.rpm	mod_ssl-2.0.52-32.2.sl4.x86_64.rpmSL 5.x   SRPMS:	httpd-2.2.3-7.sl5.src.rpm   i386:	httpd-2.2.3-7.sl5.i386.rpm	httpd-devel-2.2.3-7.sl5.i386.rpm	httpd-manual-2.2.3-7.sl5.i386.rpm	mod_ssl-2.2.3-7.sl5.i386.rpm   x86_64:	httpd-2.2.3-7.sl5.x86_64.rpm	httpd-devel-2.2.3-7.sl5.i386.rpm	httpd-devel-2.2.3-7.sl5.x86_64.rpm	httpd-manual-2.2.3-7.sl5.x86_64.rpm	mod_ssl-2.2.3-7.sl5.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News